TB

Tal Arieh Be'ery

Microsoft: 15 patents #2,618 of 40,388Top 7%
IM Imperva: 14 patents #3 of 96Top 4%
Overall (All Time): #99,681 of 4,157,543Top 3%
34
Patents All Time

Issued Patents All Time

Showing 25 most recent of 34 patents

Patent #TitleCo-InventorsDate
12192326 System and method of multi-party computation based multi-factor authentication Ouriel Ohayon, Omer SHLOMOVITS, Gary Benattar, Alexander Manuskin, Oded Leiba 2025-01-07
11930110 System and method for key recovery and verification in blockchain based networks Ouriel Ohayon, Omer SHLOMOVITS, Gary Benattar 2024-03-12
11818228 Establishing user's presence on internal on-premises network over time using network signals Itai Grady, Tom Jurgenson, Idan Plotnik, Sivan Krigsman, Michael Dubinsky +1 more 2023-11-14
11616854 System and method of secured interface to a blockchain based network Menahem CHERBAKOVSKY 2023-03-28
11616643 System and method of management of a shared cryptographic account Ouriel Ohayon, Omer SHLOMOVITS, Gary Benattar 2023-03-28
11539510 System and method of cryptographic key management in a plurality of blockchain based computer networks Ouriel Ohayon, Omer SHLOMOVITS, Gary Benattar 2022-12-27
11063960 Automatic generation of attribute values for rules of a web application layer attack detector Shelly Hershkovitz, Nitzan Niv, Amichai Shulman 2021-07-13
11050786 Coordinated detection and differentiation of denial of service attacks Amichai Shulman 2021-06-29
11025668 Detecting attacks using compromised credentials via internal network monitoring Itai Grady, Michael Dubinsky, Benny Lakunishok, Idan Plotnik 2021-06-01
10915622 Detecting local user security-related anomalies using active scans Marina Simakov, Itai Grady Ashkenazy, Chaim Menachem Hoch, Tal Joseph Maor 2021-02-09
10623234 Managing alerts regarding additions to user groups Sivan Krigsman, Itai Grady, Yaron Kaner, Amit Rosenzweig, Tom Jurgenson 2020-04-14
10609048 Systems and methods for the detection of advanced attackers using client side honeytokens Itai Grady 2020-03-31
10511599 System to filter impossible user travel indicators Ami Luttwak 2019-12-17
10505894 Active and passive method to perform IP to name resolution in organizational environments Idan Plotnik, Sivan Krigsman, Benny Lakunishok, Michael Dubinsky, Michael Dolinsky 2019-12-10
10404742 Coordinated detection and differentiation of denial of service attacks Amichai Shulman 2019-09-03
10333944 Detecting impossible travel in the on-premise settings Tom Jurgenson, Sivan Krigsman, Michael Dubinsky, Idan Plotnik, Gil David 2019-06-25
10298699 Physical location determination of internal network components Tom Jurgenson, Idan Plotnik, Michael Dubinsky, Sivan Krigsman, Gil David 2019-05-21
10148639 Distinguishing vertical brute force attacks from benign errors Idan Plotnik, Michael Dolinsky, Sivan Krigsman, Gil David, Marina Simakov 2018-12-04
10129298 Detecting attacks using compromised credentials via internal network monitoring Itai Grady, Michael Dubinsky, Benny Lakunishok, Idan Plotnik 2018-11-13
10063571 Systems and methods for the detection of advanced attackers using client side honeytokens Itai Grady 2018-08-28
9860260 Monitoring the life cycle of a computer network connection Itai Grady, Idan Plotnik 2018-01-02
9762592 Automatic generation of attribute values for rules of a web application layer attack detector Shelly Hershkovitz, Nitzan Niv, Amichai Shulman 2017-09-12
9729538 System, method and process for detecting advanced and targeted attacks with the recoupling of kerberos authentication and authorization Idan Plotnik, Michael Dolinsky, Ohad Plotnik, Gregory Messerman, Sivan Krigsman 2017-08-08
9614861 Monitoring the life cycle of a computer network connection Itai Grady, Idan Plotnik 2017-04-04
9485264 Coordinated detection and differentiation of denial of service attacks Amichai Shulman 2016-11-01